Add Mycelium To Your Mesh Networks

In many parts of the world, days after a good rainfall, it’s fairly common to see various species of mushrooms popping up out of the ground. These mysterious organisms aren’t the whole story, though. The living being is a vast network of hidden fibers, called mycelium, spreading through the ground and into any other organic material it can colonize. Its air of mystery and its vast reach are the inspiration for entire Star Trek shows and, of course, projects like this LoRa-based mesh network called Mycelium.

Mycelium is the invention of [Catamine] and includes many novel features compared to more typical mesh networks. For one, it is intended to be used in low power applications to give users the ability to send messages over a distributed network rather than a centralized network like a cell phone service provider. For another, the messages are able to be encrypted and authenticated, which is not currently possible with other mesh networks such as APRS. The idea is that a large network of people with nothing more complicated than an ESP32, an antenna, and this software would be able to communicate securely in situations where a centralized network is not available, whether that is from something like a natural disaster or from a governmental organization disabling the Internet during a political upheval.

The mesh network is currently in active development, and while messages can not yet be sent, the network is able to recognize nodes and maintain a keybase. There are certainly plenty of instances where something like this would be useful as we’ve seen before from other (non-encrypted) LoRa-based network solutions which are built around similar principles.

Thanks to [dearuserhron] for the tip!

Watching The Watchers: Are You The Star Of An Encrypted Drone Video Stream?

Small aircraft with streaming video cameras are now widely available, for better or worse. Making eyes in the sky so accessible has resulted in interesting footage that would have been prohibitively expensive to capture a few years ago, but this new creative frontier also has a dark side when used to violate privacy. Those who are covering their tracks by encrypting their video transmission should know researchers at Ben-Gurion University of the Negev demonstrated such protection can be breached.

The BGU team proved that a side-channel analysis can be done against behavior common to video compression algorithms, as certain changes in video input would result in detectable bitrate changes to the output stream. By controlling a target’s visual appearance to trigger these changes, a correlating change in bandwidth consumption would reveal the target’s presence in an encrypted video stream.

Continue reading “Watching The Watchers: Are You The Star Of An Encrypted Drone Video Stream?”